After installing the method, it is important to use iManager to complete the configuration steps outlined below. Completing these steps ensure that the method is properly configured.
Section 5.1, Activating the Method
Section 5.2, Configuring Trusted Root Certificates
Section 5.3, Configuring Certificate Revocation Checking
Section 5.4, Configuring Users